Joint Transfer of Energy and Information in a Two-hop Relay Channel

Size: px
Start display at page:

Download "Joint Transfer of Energy and Information in a Two-hop Relay Channel"

Transcription

1 Joint Transfer of Energy and Information in a Two-hop Relay Channel Ali H. Abdollahi Bafghi, Mahtab Mirmohseni, and Mohammad Reza Aref Information Systems and Secrity Lab (ISSL Department of Electrical Engineering, Sharif University of Technology, Tehran, Iran hajiabdollahi a@ee.sharif.ed,{mirmohseni,aref}@sharif.ed arxiv: v1 [cs.it] 13 Apr 2017 Abstract We stdy the problem of joint information and energy transfer in a two-hop channel with a Radio freqency (RF energy harvesting relay. We consider a finite battery size at the relay and deterministic energy loss in transmitting energy. In other words, to be able to send an energy-contained symbol, the relay mst receive mltiple energy-contained symbols. Ths, we face a kind of channel with memory. We model the energy saved in battery as channel state with the challenge that the receiver does not know the channel state. First, we consider the problem withot any channel noise and derive an achievable rate. Next, we extend the reslts to the case with an independent and identically distribted noise in the second hop (the relay-receiver link. I. INTRODUCTION Nowadays energy consmption becomes an important design factor in commnication systems instead of traditional parameters like throghpt becase of financial reasons and environmental concerns. There wold be many eqipments with large energy consmption in next generation (5G networks, so energy efficiency will play an important rle in these networks [1]. One of alternative techniqes sed for energy consmption management is energy harvesting. Energy harvesting enables wireless networks to se environmental energies to increase energy efficiency, so reqired energy for commnication nodes in wireless networks decrease noticeably. This promising method is introdced in two main directions: (i in the first direction, energy is harvested from environmental sorces like wind and snlight. The main characteristic of this setp is the sporadic natre of the harvested energy which makes the exact analysis rather difficlt; (ii in the second direction, known as Radio freqency (RF energy harvesting, energy is harvested from the radio waves in space. This techniqe is promising with an increasing demand profile and some commercialized prodcts [2]. De to less randomness in obtaining the harvested energy, the analysis and strategies cold be simpler compared with the harvesting from the environment. The RF energy can be transferred concrrently with the information signal in a wireless system, proposed as simltaneos wireless information and power transfer (SWIPT [1], [2]. A sefl scenario in this case is to se received energy for ftre transmissions. In this scenario, the design of encoder and decoder is a new open problem, becase This work was spported in part by the Iran National Science Fondation nder Grant of the memory now appeared in the system. In addition, the existing works show an inherent trade-off in transmitting energy and information simltaneosly [2]. Ths to nderstand the interplay among energy and information and also to obtain the optimal coding strctre in this scenario, an information theoretic model works. Becase of complexity of models (especially channels with memory, fndamental limits in this system are not noticed widely. In particlar, it is not clear what are the properties of an optimal code in this system(the code which transmits information and energy simltaneosly. One of the encoding methods for the joint energy and information transfer ses a finite state Markov sorce to generate codewords [3]. The energy reception constraint can be modeled with a channel with constraint on otpt, whose capacity was derived by Gastpar in [4]. He also extended this reslt to mltiple access and Gassian relay channels [4]. The problem of transmission of optimal rate with constraint on minimm received energy was stdied by Varshney in [5], where the capacity-energy fnction was introdced and some of its featres were characterized. A channel with stochastic power restriction was stdied by Ozel and Ulks [6]. They showed that the capacity of the AWGN channel with random power available at the transmitter is the same as the capacity of an AWGN channel with an average power constraint eqal to the average recharge rate. Capacity of a mltiple access channel with constraint on received power was derived by Foladgar and Simeone [7]. They also stdied the mlti-hop channel with energy harvesting relay and introdced capacityenergy fnction. However, they did not consider a finite battery at the relay [7]. The capacity of a point to point channel with an energy harvesting transmitter was determined by Ttncogl et. al. [8], where the battery size was assmed to be one. The problem of interactive commnication with energy transfer (re-transmit the received energy with finite battery sizes (i.e., finite energy nits available in the system was stdied by Popovski et. al. [9]. They derived the inner and oter bond for a two way orthogonal channel with finite energy nits. In their system model, two nodes have a constant sm of energy nits. If a node wants to send symbol 1, it has to cost one energy nit, bt sending symbol 0 does not cost any energy nit. Similarly if a node receives symbol 1, it can save one energy nit and receiving symbol 0 does not have any energy nit [9]. One of the important challenges which

2 is not considered in [9] is that the receiver node cannot save energy of received signal entirely and an energy loss occrs. This energy loss can be modeled by assming that the receiver has to receive m energy-contained symbols for sending a symbol with energy. Another interactive scenario that can be stdied to nderstand the natre of the optimal codes in a joint information and energy transfer is relay channel. In this paper, we consider a two-hop channel with an RF energy harvesting relay, where the transmitter jointly transfers information and energy to the relay. The harvested energy at the relay is sed to re-transmit the data to the receiver. We assme finite battery size at the relay. The energy loss in transmitting energy is modeled with a fixed deterministic redction in energy. In fact, the relay mst receive mltiple energy-contained symbols to be able to send one energycontained symbol. These limitations at the relay trn the problem to the transmission over a channel with states, where the state shows the energy level at the relay s battery. Hence, we face a kind of channel with memory. Ths, the main qestions are which rates wold be achievable in these models and what the strctre of the coding techniqes are that achieve those rates. One of the main challenge in the code design is to make the receiver be able to decode the message withot knowing the seqence of states. We model the energy stored in relay s battery as channel state with the challenge that the receiver does not know the channel state. First, we consider the problem withot any channel noise and derive an achievable rate. We propose a new block Markov coding based achievability scheme in which the random codebooks are generated for each state. We show that the received codewords in the receiver form Markov sorces. We se this property and Asymptotic Eqipartition Property (A.E.P Theorem [10] to propose a new decoding strategy which does not need state seqence at the receiver. Next, we consider the problem with an independent and identically distribted noise in the second hop (the relay-receiver link and find a coding scheme which works in the noisy condition. Ths, we extend or achievable reslts to the noisy case, where we modify the decoding strategy at the receiver by sing typical decoding with the capability of decoding withot knowing state seqence. II. SYSTEM MODEL We consider a binary and noiseless two-hop relay channel illstrated in Fig. 1, in which the relay node has energy restriction (i.e., the relay mst harvest energy from its received signal to be able to transmit. Also, we assme a finite battery at the relay which can save finite nmber of energy nits. Ths, the transmitted symbol depends on the harvested energy from received symbols. Notation: Upper-case letters (e.g., X denote Random Variables (RVs and lower-case letters (e.g., x their realizations. The probability mass fnction (p.m.f of a RV X with alphabet set X is denoted by p X (x; occasionally, sbscript X is omitted. X j i indicates a seqence of RVs (X i, X i+1,..., X j ; we se X j instead of X j 1 for brevity. The channel inpts at the transmitter and the relay are shown by {X 1,1, X 1,2, X 1,3,...} and {X 2,1, X 2,2, X 2,3,...}, respectively. The otpt at the relay and the receiver s are denoted by {Y 2,1, Y 2,2, Y 2,3,...} and {Y 3,1, Y 3,2, Y 3,3,...}, respectively. The channel inpt at the transmitter and the channel otpts at the relay and the receiver have binary alphabets, i.e., X 1 = Y 2 = Y 3 = {0, 1}. The alphabet of channel inpt at the relay is shown by X 2 (will be introdced later. {U 1, U 2, U 3,...} show the level of battery storage in the i-th transmission which are sed to model the channel state. S i are considered as: S 1 = (U 1, U 2, S 2 = (U 2, U 3, S 3 = (U 3, U 4,... which are sed in frther proofs. π denotes the steady state probability of the -th state of the Markov chain. In or system model transmitting symbol 1 needs m energy nits, while symbol 0 can be sent with no energy (the transmitting symbol 1 costs m energy nits for the relay. However, receiving symbol 1 at the relay charges the battery with only one energy nit. This consideration shows the energy loss in the channel. The transmitter does not have energy restriction and it can transmit any symbol in each channel se. The transmitter sends a message M [1, 2 nr ] to the relay node in n channel ses (by transmitting X n 1. Then, the relay decodes this message and sends it to the receiver (by transmitting X n 2. The X 2, is the set of symbols which can be transmitted by relay when channel state is. The channel state shows the energy nits stored in the relay s battery and U is the maximm battery size. Energy restriction in the relay node is described as: < m X 2, {0} (1 m X 2, {0, 1} (2 where [0 : U]. We call this system as noiseless twohop relay channel with finite battery (Noiseless THRC-FB. Becase of the noiseless channel property, the otpts are eqal to inpts in each hop, i.e., Y 2 = X 1, Y 3 = X 2, where Y 2, Y 3 are the received symbols at the relay and the receiver. The main difficlty here is that the system has memory de to the energy restriction and finite battery size at the relay. Or approach is to model the energy nits (in the relay s battery as the state of the system. Also, we assme that the receiver does not know the state seqence, which is another difficlty we face. The state diagram of the channel is shown in Fig. 2. As seen in Fig. 2, when the battery is in state in the crrent transition, the following cases occr in the state diagram: iif the relay receives symbol 1 and transmits symbol 0, the state in the next transition wold be +1 (except when = U, where the next state won t change; iiif the relay receives symbol 0 and transmits symbol 1, the state in the next transition wold be m (in this case we mst have > m 1, otherwise it does not occr; iiiif the relay receives symbol 1 and transmits symbol 1, the state in the next transition wold be m + 1 (in this case we mst have > m 2, otherwise it does not occr; ivif the relay receives symbol 0 and transmits symbol 0, the next state wold be the same as the crrent state. Now, to insert the noise in to the problem, we consider a binary memoryless channel between the relay and the

3 Fig. 1. Noiseless two-hop relay channel with finite battery (Noiseless THRC- FB Fig. 2. State diagram of noiseless THRC-FB receiver (the second hop. In this case, noise has the ability to change the transmitted symbol, and of corse its energy, randomly. This means that if channel converts symbol 1 into symbol 0, it wold not have energy and if channel converts symbol 0 into symbol 1, it wold contain one energy nit. However, this change does not affect the channel state diagram, and ths it is not important in the channel memory. This system model is illstrated in Fig.3. All of other considerations are exactly as same as previos model. We call this system as noisy two-hop relay channel with finite battery (Noisy THRC-FB. Encoding and decoding fnctions depend on battery size U, so we have to inclde this parameter in or code definition. A (2 nr, n, U code for (Noiseless/Noisy THRC-FB consists of a message set [1 : 2 nr ], an encoder fnction which maps m [1 : 2 nr ] to x n 1 (m, a set of relay encoder fnctions which map each past received seqence x i 1 1 to x 2,i (x i 1 1 for i [1 : n], and a decoder fnction which estimates ˆm from the received seqence y3 n in receiver. We define the average probability of error P e (n = P {M ˆM}. A rate R is achievable for (Noiseless/Noisy THRC-FB, if there exists a (2 nr, n, U code sch that lim P e (n = 0 n III. NOISELESS THRC-FB In this section we propose an achievable rate for the noiseless THRC-FB. First we provide a lemma (to be sed in the achievability proof, where we state a sfficient condition for Fig. 3. Noisy two-hop relay channel with finite battery (Noisy THRC-FB- noise between the relay and the receiver existence of steady state probabilities in a finite state Markov chain. Next, we prove an achievability theorem based on block Markov coding. We sed sperposition coding for codebook generation for each state. The novel part of or work is in the decoding at the receiver withot knowing the state seqence. We se backward decoding and A.E.P Theorem [10, Theorem 6.6.1] for message decoding in receiver. Lemma 1: Consider an indecomposable Markov chain with r possible states. The steady state probabilities exist, if there exists a state S in the state diagram which is accessible from itself in one transition (the probability of retrning to itself in next transition is nonzero. Proof: It is known that a sfficient condition for existence of the steady state probabilities is that there exist a state Ŝ and a positive nmber n sch that beginning from any state we can reach state Ŝ in n steps [10, Theorem ]. Now, we show these conditions hold by choosing Ŝ to be S and n to be maximm distance between S and any other states in state diagram. Let S k be the states which has distance k from S and m be the maximm distance, i.e., m = max k. One can reach S from S k in l steps, where l is an arbitrary integer nmber that l k. Becase, after first arrival to S, we can stay there (de to the assmption of lemma. Therefore, beginning from any state we can reach S in at least m steps. Theorem 1: The following rate, R, is achievable for Noiseless THRC-FB: R < max min{ U π H(X 2, π H(X X2 1 } p(x 1,x 2 (3 where p(x 1, x 2 is chosen sch that the state diagram of channel satisfies assmptions of Lemma 1. This means that the state diagram is indecomposable and there exists a state S in the state diagram which is accessible from itself in one transition. For simplicity, from now on, we call this class of p.m.f.s indecomposable. { Note that for [0 : m 1] we mst 1 x2 = 0 have p(x 2 =. 0 x 2 = 1 Proof: Or scheme ses block Markov coding, where the B blocks of transmissions (each of n symbols are sent to the relay node to transmit a seqence of B 1 independent and identically distribted (i.i.d messages M b, b [1 : B 1] while the message of the last block is deterministic. Similarly, the relay node sends B blocks to the receiver in which the message of the first block is deterministic and the messages of the remaining blocks are the same as the transmitter s message with one block delay. At the end of each block, the relay decodes the message and sends it to the receiver in the next block. Ths, the relay sends a deterministic message in the first block and the transmitter sends a deterministic message in last block. Since the state space is finite, we can control the initial state in each block with at most U transmissions. Ths, we assme that the initial state in each block can be adjsted and for simplicity we do not contain these U transmissions in or frther discssions. In fact, by inclding these transmissions,

4 Fig. 4. Sperposition coding for each state with joint p.m.f p(x 1, x 2 each block contains n + U bits instead of n bits. Codebook generation: For each state U, fix an indecomposable p.m.f p(x 1, x 2. Now, for each state U and for each block b [1 : B 1], we generate randomly and independently 2 nr seqences x n+δ 2 (m b 1, where m b 1 [1 : 2 nr ], each according to n+δ p X2 (x 2,i. For each m b 1 [1 : 2 nr ], we generate randomly and conditionally independently K seqences x n+δ 1 (m,b, m b 1, where m,b [1 : K ], each according to n+δ p X1 X 2 (x 1,i x 2,i (m b 1, where K is the size of the transmitter s codebook of state and m,b is the message of the transmitter s codebook of state in block b. We have m 0 = m B = 1. In fact, we do a kind of rate splitting in transmitter in which K = 2 nr and R is the rate of each codebook. The codewords are shown in Fig. 4. In addition, we generate 2 nr i.i.d random variables U(m b 1, where m b 1 [1 : 2 nr ], with p.m.f π. These random variables will be sed as initial state of channel in block b. We remark that only the first n bits (in each codeword contain message and we find n for each state sch that the error probability tends to zero. Other δ bits are generated to protect channel s statistical properties (Markovity from change. This means that we generate δ joint random bits from the p.m.f p(x 1, x 2 for each message set (m,b, m b 1. Ths, if n bits of codeword of state are sent completely before the codewords of other states, sending these δ bits wold prevent the changing of statistical properties of channel state diagram. δ can be chosen as large as n min(n to satisfy the above condition. The transmission strategy is described in the following. Encoding (at the beginning of block b U Transmitter: To send message m b [1, K ] in block b, transmitter maps the message into a message vector [m 0,b, m 1,b,..., m U,b ], m,b [1 : K ]. Then, it selects the codeword x n+δ 1 (m,b, m b 1 from the codebook corresponding to state. In addition, we set a vector as: [l 0,b = 1, l 1,b = 1,..., l U,b = 1]. For encoding in block b, Fig. 5. Flowchart of encoding block b in transmitter and relay starting from the beginning of the block with 1 as initial state, we send x (m 1 1,l 1,b 1,b, m b 1 and we set l 1,b = l 1,b +1. We repeat this procedre for next transmissions. Encoding procedre is shown completely in Fig 5. This procedre is similar to the encoding introdced in [9]. Relay: The relay sends message m b 1 in block b, so it selects codeword m b 1 from each codebook as the message of that codebook and chooses U(m b 1 as initial state. The next stages are the same as the encoding at the transmitter and are shown in Fig. 5. Decoding (at the end of block b Relay: The state seqence in block b, n b, is known at the relay, becase it knows its battery storage. Ths, for each [0 : U], the relay makes a set A = {i i = }. If A n, the relay looks for an ˆm,b = {m x2,k,b (m,b = x 2,b,ik }, k [1 : n ] and i 1 i 2... i n. This procedre is shown in Fig. 6. In the error probability analysis, we find the conditions which garantee the ˆm,b to be niqe. Then, the relay forms the vector [ ˆm 0,b, ˆm 1,b,..., ˆm U,b ] and by the inverse of mapping sed in encoding, it can decode ˆm b. This procedre is like the decoding introdced in [9]. Receiver: The receiver ses backward decoding. In the last block, the transmitted message is fixed, i.e., m B = 1. Assme that the relay transmits the message m B 1 in last block, where m B 1 [1 : 2nR ]. The receiver rns the flowchart shown in Fig. 5 for each m B 1 and comptes the seqence generated at the relay for each m B 1. We call these seqences Xn 2 (m B = 1, m B 1.Indeed, Xn 2 (m B = 1, m B 1 is the seqence which is received at the receiver if the relay sends message m B 1 in last block. To perform the above decoding, the receiver does not need the state seqence, becase: 1the codebooks and initial states are shared; 2there is not any noise; 3as we see in the flowchart of Fig. 5, since the transmitter s message (in last block m B = 1, relay s message (m B 1 and the initial

5 Fig. 6. Flowchart of decoding block b in relay state are known, after every transmission the next state can be determined and X2 n (m B = 1, m B 1 cold be derived for each m B 1 [1 : 2nR ]. Then, the receiver looks for a niqe ˆm B 1, sch that its compted seqence is eqal to the received seqence. We show that 2 nr probable received seqences are not eqal with probability 1. When message m B 1 is decoded, the transmitter s message in block B 1 is known and the above procedre can be repeated to decode the previos blocks messages. Error probability analysis: The probability of error is pper bonded by the sm of probabilities of error in the relay and the receiver. The error events at the relay in each block are: ε (1 = Relay does not receive the codeword of at least one of the codebooks (corresponds to a state completely. We define ε (1 as the event in which the relay does not receive the codeword of codebook completely. ε (2 = There are more than one eqal codewords with received seqence in at least one of codebooks. We define ε (2 as the event in which there are more than one eqal codewords with the received seqence of codebook. where it is seen that P (ε (i P (ε (i, i {1, 2}. First, we consider the ε (1. Recall that the state seqence has steady state by Lemma 1. In addition, based on a reslt in [10, Theorem ], in a finite Markov chain with steady state, the relative freqency of being in a state converges to the steady state probability π, in probability. Ths, if we choose n = n(π ɛ, the event ε (1 does not occr with probability 1 and P (ε (1 goes to zero for large enogh n. Based on Lemma (2, the probability of the second error event (ε (2 goes to zero if: log(k n < H(X 1 X2 ɛ (4 Lemma 2: Fix a joint p.m.f p(, x and generate a random seqence U n according to n p U ( i, then generate randomly and conditionally independently 2 nr seqences X n (m, m [1 : 2 nr ], each according to n p X U (x i i. If we have R < H(X U, then probability of the event {X n (m = X n (m, m m }, wold tend to zero. Proof: Based on packing lemma [11], if the seqence X n (1 is passed throgh a discrete memoryless channel n p Y X (y i x i and the seqence Y n is constrcted and if R < I(X; Y U, then we wold have P ((U n, X n (m, Y n A n ε (p(, x, y 0, m 1. Now we consider a p(y x sch that p(y = x x = 1, p(y x x = 0, so we obtain Y n = X n (1. Now we determine A n ε (p(, x, y. By definition we have: A n ε (p(, x, y = {(x n, n, y n π(x,, y x n, n, y n p(, x, y εp(, x, y, U, x X, y Y} (5 in which π(x,, y x n, n, y n is the percentage of repetition of, x, y in the seqence x n, n, y n. For conditional distribtion described above, we have p (, x, y x = 0, p (, x, y = x = p (, x p (y x = p (, x, and ths: π (, x, y x n, x n, y n = 0 (6 π (, x, y = x n, x n, y n = π (, x n, x n (7 By inserting (6 and (7 in (5, we get: A n ε (p (, x, y = {( n, x n, y n ( n, x n A n ε (p (, x, x n = y n } (8 which reslts in: P ((U n, X n (m, Y n A n ε (p(, x, y = P ((U n, X n (m A n ε (p(, x X n (m = X n (1 So by packing lemma [11] for m 1, we have: P ((U n, X n (m, Y n A n ε (p(, x, y < ε P ((U n, X n (m A n ε (p(, x X n (m = X n (1 < ε And by complementing above eqation we have: P ((U n, X n (m / A n ε (p(, x X n (m X n (1 > 1 ε (9 we apply nion bond to obtain: P ((U n, X n (m / A n ε (p(, x X n (m X n (1 P ((U n, X n (m / A n ε (p(, x + P (X n (m X n (1 (10 In addition, by Joint A.E.P Theorem [12, Theorem 7.6.1], we have: P ((U n, X n (m / A n ε (p(, x < ε (11 By combining (9-(11 we obtain: P (X n (m X n (1 > 1 ε ε = 1 ε

6 So by packing lemma [11] and discssions given in the first paragraph of proof and the fact X = Y, if we have: R < I (X; Y U = I (X; X U = H (X U then we can derive ineqality (12: P (X n (m = X n (1 < ε, m 1 (12 Where ε cold take every small vale for large enogh n. Repeating this argment for each X n (m, m [1 : 2 nr ], completes the proof. If we sbstitte n = n(π ɛ in (4, we obtain: n = n (π ɛ n < n (π 1 n > 1 n (π R = log U 2 K = n R < < π log 2 K nπ (13 π log 2 K n (14 π H(X 1 X 2 (15 where eqation (14 is derived by eqation (13 and eqation (15 is derived by eqations (4 and (14. For error probability analysis in receiver, recall that in the last block, the transmitter s message is deterministic and so the receiver derives X2 n (m B = 1, m B 1, m B 1 [1 : 2 nr ]. Since we assme that relay sends X2 n (m B = 1, m B 1 = 1, If at least one X2 n (m B = 1, m B 1 1 becomes eqal to X2 n (m B = 1, m B 1 = 1, the error occrs in the receiver. Lemma 3: For each m B 1 [1 : 2nR ], the X2 n (m B = 1, m B 1 is an independent reglar Markov sorce. Proof: Independency can be easily dedced from the codebook generation becase the initial states and all codewords in each codebook are generated independently. To show that these seqences are reglar markov sorces, we define a new Markov chain as: denoting the state seqence as U 1, U 2, U 3,..., the new Markov chain is S 1 = (U 1, U 2, S 2 = (U 2, U 3, S 3 = (U 3, U 4,..., as we described in section (II. Since X 2i is determined by U i, U i+1, we have X 2,i = f(s i, where f is a deterministic fnction. Ths, X 2,i is a markov sorce. Moreover, the assmptions of Lemma 1 are also satisfied by the new Markov chain S i and so steady state probabilities exist. This shows that X 2,i is a reglar Markov sorce. Since a reglar Markov sorce is ergodic [10, Theorem 6.6.2], X 2,i satisfies conditions of Asymptotic EqiPartition Property (A.E.P Theorem [10, Theorem 6.6.1] which states that if we have 2 nr i.i.d Markov sorces with entropy rate H{X}, these Markov sorces are not eqal with probability 1 when R < H{X}. Now, we derive the entropy rate of X 2,i. Since X 2,i is not nifilar, we cannot se entropy rate of nifilar Markov sorces (a nifilar Markov sorce is a Markov sorce in which the present state U n and the present otpt X n compte the next state U n+1. We se the followings (for simplicity, the index B for block nmber is omitted from the eqations: H(X 2,n X 2,n 1,..., X 2,1 H(X 2,n U n, X 2,n 1,..., X 2,1 (16 = H(X 2,n U n = H(X 2,1 U 1 = π H(X 2 (17 The ineqality (16 follows from the fact that conditioning does not increase the entropy and the eqation (17 holds since conditioning on U n, the distribtion of X 2,n is determined independent of X 2,n 1,..., X 2,1 and or processes are stationary. Therefore, if R < U π H(X 2, then the generated seqences are not eqal with probability 1 by A.E.P Theorem. This completes the proof. Note that to find K, first we have to solve optimization problem in eqation (3, so we can determine p(x 1, x 2. Next, we calclate H ( X 1 X 2 and we consider K < H ( X 1 X2. IV. NOISY THRC-FB Theorem 2: The following rate, R, is achievable for Noisy THRC-FB: R < max min{ U π I(X 2 ; Y 3, π H(X X2 1 } p(x 1,x 2 (18 where P (x 1, x 2 is an indecomposable { p.m.f and for 1 x2 = 0 [0 : m 1] we mst have p(x 2 =. 0 x 2 = 1 Proof: All proof steps of this theorem are exactly the same as the proof of Theorem 1, except the decoding at the receiver and the error probability analysis in receiver. Ths, we only highlight the differences. Receiver decoding: Receiver ses backward decoding. As we showed for noiseless THRC-FB, the relay comptes X2 n (m B = 1, m B 1 for each m B 1 [1 : 2nR ]. Then, the receiver looks for ˆm B 1 which satisfies (X2 n (m B = 1, ˆm B 1, Y3,B n τ ε (n, where the Y3,B n is received seqence in receiver in block B. Error probability analysis in receiver: As we showed in Lemma 2, X2 n (m B = 1, m B 1 are independent and identical Markov sorces (for m B 1 [1 : 2 nr ]. If the relay sends the seqence X2 n (m B = 1, m B 1 = 1 in block B, the received seqence in the receiver becomes independent of the other seqences X2 n (m B = 1, m B 1 1. Ths, we calclate probability of the event in which (X2 n (m B = 1, ˆm B 1 1, Y3,B n τ ε (n (for simplicity, the index B for block nmber is omitted from eqations: P e = P (X2 n = αp (Y3 n = β (α,β A n ε 2 n(h{x2}+ε 2 n(h{y3}+ε 2 n(h{x2,y3} ε (19 So the pper bond on the error probability is: P error 2 nr 2 n(h{x2}+h{y3} H{X2,Y3} 3ε (20

7 Ths the error probability tends to zero, if: 1 n R < H { X 2 } + H { Y3 } H { X2, Y 3 } = lim n (I (Xn 2 ; Y3 n (21 In addition, Y3 n is stationary, so we have: 1 lim n n H (Y 3 n = lim H(Y 3,n Y 3,n 1, Y 3,n 2,..., Y 3,1 n The term in the left hand side can be written as: H(Y 3,n Y 3,n 1,..., Y 3,1 H(Y 3,n U n, Y 3,n 1,..., Y 3,1 (22 = H(Y 3,n U n = H(Y 3,1 U 1 = π H(Y 3 (23 The reasons for (22 and (23 are exactly the same as the ones for (16 and (17. On the other hand, we have a binary memoryless channel which satisfies: H (Y n 3 X n 2 = which can be contined as: H (Y 3,k X 2,k = x = x = = n H (Y 3,k X 2,k k=1 H (Y 3,k X 2,k = x p (X 2,k = x H (Y 3,k X 2,k = x π p (X 2,k = x (24 π H (Y 3 X 2 = x p (X 2 = x x π H ( Y 3 X2 (25 (26 where (24 is de to the law of total probability and the eqation (25 holds thanks to the stationarity of X 2,k, Y 3,k. By combining (21, (23 and (26, we derive: 1 n (I (Xn 2 ; Y n 3 π I ( Y 3 ; X 2 (27 Now, based on (20 and (27, we see that if R < π I ( Y 3 ; X 2, then the error probability in receiver tends to zero. Hence proof is complete. V. DISCUSSIONS AND CONCLUSIONS We stdied a two-hop channel with an RF energy harvesting relay (with finite battery size, where the transmitter jointly transfers information and energy to the relay. Modeling the energy level at the relay s battery with states, we propose the achievability schemes for the channel with memory, where the main challenge was the nknown state at the receiver. Or proposed schemes work for the noiseless channel and the channel with noisy second hop. Noisy first hop: By considering the noise in the first hop (between the transmitter and relay, the transmitter does not know the relay s battery level. Ths, the state is not available to the transmitter and as a reslt the receiver cannot compte the possible transmitted seqences of relay (for each message. Therefore, the proposed schemes are not readily extended to this case. Designing appropriate coding schemes for this channel is or ongoing research work. Upper bond: De to the channel memory, the problem of finding a tight oter bond for this system model cannot be tackled by sing standard ineqalities sed in converse proofs. REFERENCES [1] S. Bzzi, C.-L. I, T. E. Klein, C. Yang, H. V. Poor, and A. Zappone, A Srvey of Energy-Efficient Techniqes for 5G Networks and Challenges Ahead,, IEEE J. Sel. Areas Commn., vol. 34, no. 4, pp , Apr [2] X. L, P. Wang, D. Niyato, D. I. Kim, and Z. Han, Wireless networks with RF energy harvesting: a contemporary srvey,, IEEE Commnications Srveys and Ttorials, vol. 17, no. 2, pp , [3] A. M. Foladgar, O. Simeone, and E. Erkip, Constrained Codes for Joint Energy and Information Transfer,, IEEE Trans. on Commn., vol. 62, no. 6, pp , Jne [4] M. Gastpar, On capacity nder receive and spatial spectrm-sharing constraints,, IEEE Trans. Inf. Theory, vol. 53, no. 2, pp , Feb [5] L. R. Varshney, Transporting information and energy simltaneosly,, in Proc. IEEE Int. Symposim on Inform. Theory, pp , [6] O. Ozel and S. Ulks, Information-theoretic analysis of an energy harvesting commnication system,, in Proc. IEEE Int. Symposim on PIMRC, pp , [7] A. M. Foladgar, and O. Simeone, On the Transfer of Information and Energy in Mlti-User Systems,, IEEE Wireless Commn.Lett., vol. 16, no. 11, pp , Sept [8] K. Ttncogl, O. Ozel, A. Yener, and S. Ulks, Binary energy harvesting channel with finite energy storage,, in Proc. IEEE Int. Symposim on PIMRC, pp , [9] P. Popovski, A. Foladgar, and O. Simeone, Interactive joint transfer of energy and information,, IEEE Trans. on Commn.,vol. 61, no. 5, pp , May [10] R. B. Ash, Information Theory. Interscience, New York, [11] A. El Gamal and Y. H. Kim, Network information theory. Cambridge University Press, [12] T. Cover and J. A. Thomas, Elements of Information Theory. Wiley- Interscience, 2006.

Network Coding for Multiple Unicasts: An Approach based on Linear Optimization

Network Coding for Multiple Unicasts: An Approach based on Linear Optimization Network Coding for Mltiple Unicasts: An Approach based on Linear Optimization Danail Traskov, Niranjan Ratnakar, Desmond S. Ln, Ralf Koetter, and Mriel Médard Abstract In this paper we consider the application

More information

Capacity of channel with energy harvesting transmitter

Capacity of channel with energy harvesting transmitter IET Communications Research Article Capacity of channel with energy harvesting transmitter ISSN 75-868 Received on nd May 04 Accepted on 7th October 04 doi: 0.049/iet-com.04.0445 www.ietdl.org Hamid Ghanizade

More information

Classify by number of ports and examine the possible structures that result. Using only one-port elements, no more than two elements can be assembled.

Classify by number of ports and examine the possible structures that result. Using only one-port elements, no more than two elements can be assembled. Jnction elements in network models. Classify by nmber of ports and examine the possible strctres that reslt. Using only one-port elements, no more than two elements can be assembled. Combining two two-ports

More information

EE 4TM4: Digital Communications II. Channel Capacity

EE 4TM4: Digital Communications II. Channel Capacity EE 4TM4: Digital Communications II 1 Channel Capacity I. CHANNEL CODING THEOREM Definition 1: A rater is said to be achievable if there exists a sequence of(2 nr,n) codes such thatlim n P (n) e (C) = 0.

More information

Capacity of the Discrete Memoryless Energy Harvesting Channel with Side Information

Capacity of the Discrete Memoryless Energy Harvesting Channel with Side Information 204 IEEE International Symposium on Information Theory Capacity of the Discrete Memoryless Energy Harvesting Channel with Side Information Omur Ozel, Kaya Tutuncuoglu 2, Sennur Ulukus, and Aylin Yener

More information

Decoder Error Probability of MRD Codes

Decoder Error Probability of MRD Codes Decoder Error Probability of MRD Codes Maximilien Gadolea Department of Electrical and Compter Engineering Lehigh University Bethlehem, PA 18015 USA E-mail: magc@lehighed Zhiyan Yan Department of Electrical

More information

Lecture Notes On THEORY OF COMPUTATION MODULE - 2 UNIT - 2

Lecture Notes On THEORY OF COMPUTATION MODULE - 2 UNIT - 2 BIJU PATNAIK UNIVERSITY OF TECHNOLOGY, ODISHA Lectre Notes On THEORY OF COMPUTATION MODULE - 2 UNIT - 2 Prepared by, Dr. Sbhend Kmar Rath, BPUT, Odisha. Tring Machine- Miscellany UNIT 2 TURING MACHINE

More information

Shannon s noisy-channel theorem

Shannon s noisy-channel theorem Shannon s noisy-channel theorem Information theory Amon Elders Korteweg de Vries Institute for Mathematics University of Amsterdam. Tuesday, 26th of Januari Amon Elders (Korteweg de Vries Institute for

More information

Universal Scheme for Optimal Search and Stop

Universal Scheme for Optimal Search and Stop Universal Scheme for Optimal Search and Stop Sirin Nitinawarat Qalcomm Technologies, Inc. 5775 Morehose Drive San Diego, CA 92121, USA Email: sirin.nitinawarat@gmail.com Vengopal V. Veeravalli Coordinated

More information

Secret Key Agreement Using Conferencing in State- Dependent Multiple Access Channels with An Eavesdropper

Secret Key Agreement Using Conferencing in State- Dependent Multiple Access Channels with An Eavesdropper Secret Key Agreement Using Conferencing in State- Dependent Multiple Access Channels with An Eavesdropper Mohsen Bahrami, Ali Bereyhi, Mahtab Mirmohseni and Mohammad Reza Aref Information Systems and Security

More information

Decoder Error Probability of MRD Codes

Decoder Error Probability of MRD Codes Decoder Error Probability of MRD Codes Maximilien Gadolea Department of Electrical and Compter Engineering Lehigh University Bethlehem, PA 18015 USA E-mail: magc@lehigh.ed Zhiyan Yan Department of Electrical

More information

Can Feedback Increase the Capacity of the Energy Harvesting Channel?

Can Feedback Increase the Capacity of the Energy Harvesting Channel? Can Feedback Increase the Capacity of the Energy Harvesting Channel? Dor Shaviv EE Dept., Stanford University shaviv@stanford.edu Ayfer Özgür EE Dept., Stanford University aozgur@stanford.edu Haim Permuter

More information

Stability of Model Predictive Control using Markov Chain Monte Carlo Optimisation

Stability of Model Predictive Control using Markov Chain Monte Carlo Optimisation Stability of Model Predictive Control sing Markov Chain Monte Carlo Optimisation Elilini Siva, Pal Golart, Jan Maciejowski and Nikolas Kantas Abstract We apply stochastic Lyapnov theory to perform stability

More information

Prediction of Transmission Distortion for Wireless Video Communication: Analysis

Prediction of Transmission Distortion for Wireless Video Communication: Analysis Prediction of Transmission Distortion for Wireless Video Commnication: Analysis Zhifeng Chen and Dapeng W Department of Electrical and Compter Engineering, University of Florida, Gainesville, Florida 326

More information

Optimal Control of a Heterogeneous Two Server System with Consideration for Power and Performance

Optimal Control of a Heterogeneous Two Server System with Consideration for Power and Performance Optimal Control of a Heterogeneos Two Server System with Consideration for Power and Performance by Jiazheng Li A thesis presented to the University of Waterloo in flfilment of the thesis reqirement for

More information

Superposition Encoding and Partial Decoding Is Optimal for a Class of Z-interference Channels

Superposition Encoding and Partial Decoding Is Optimal for a Class of Z-interference Channels Superposition Encoding and Partial Decoding Is Optimal for a Class of Z-interference Channels Nan Liu and Andrea Goldsmith Department of Electrical Engineering Stanford University, Stanford CA 94305 Email:

More information

Simulation investigation of the Z-source NPC inverter

Simulation investigation of the Z-source NPC inverter octoral school of energy- and geo-technology Janary 5 20, 2007. Kressaare, Estonia Simlation investigation of the Z-sorce NPC inverter Ryszard Strzelecki, Natalia Strzelecka Gdynia Maritime University,

More information

Information Source Detection in the SIR Model: A Sample Path Based Approach

Information Source Detection in the SIR Model: A Sample Path Based Approach Information Sorce Detection in the SIR Model: A Sample Path Based Approach Kai Zh and Lei Ying School of Electrical, Compter and Energy Engineering Arizona State University Tempe, AZ, United States, 85287

More information

Research Article Permanence of a Discrete Predator-Prey Systems with Beddington-DeAngelis Functional Response and Feedback Controls

Research Article Permanence of a Discrete Predator-Prey Systems with Beddington-DeAngelis Functional Response and Feedback Controls Hindawi Pblishing Corporation Discrete Dynamics in Natre and Society Volme 2008 Article ID 149267 8 pages doi:101155/2008/149267 Research Article Permanence of a Discrete Predator-Prey Systems with Beddington-DeAngelis

More information

LOS Component-Based Equal Gain Combining for Ricean Links in Uplink Massive MIMO

LOS Component-Based Equal Gain Combining for Ricean Links in Uplink Massive MIMO 016 Sixth International Conference on Instrmentation & Measrement Compter Commnication and Control LOS Component-Based Eqal Gain Combining for Ricean Lins in plin Massive MIMO Dian-W Ye College of Information

More information

Sources of Non Stationarity in the Semivariogram

Sources of Non Stationarity in the Semivariogram Sorces of Non Stationarity in the Semivariogram Migel A. Cba and Oy Leangthong Traditional ncertainty characterization techniqes sch as Simple Kriging or Seqential Gassian Simlation rely on stationary

More information

Capacity Provisioning for Schedulers with Tiny Buffers

Capacity Provisioning for Schedulers with Tiny Buffers Capacity Provisioning for Schedlers with Tiny Bffers Yashar Ghiassi-Farrokhfal and Jörg Liebeherr Department of Electrical and Compter Engineering University of Toronto Abstract Capacity and bffer sizes

More information

Joint Source-Channel Coding for the Multiple-Access Relay Channel

Joint Source-Channel Coding for the Multiple-Access Relay Channel Joint Source-Channel Coding for the Multiple-Access Relay Channel Yonathan Murin, Ron Dabora Department of Electrical and Computer Engineering Ben-Gurion University, Israel Email: moriny@bgu.ac.il, ron@ee.bgu.ac.il

More information

Lecture Notes: Finite Element Analysis, J.E. Akin, Rice University

Lecture Notes: Finite Element Analysis, J.E. Akin, Rice University 9. TRUSS ANALYSIS... 1 9.1 PLANAR TRUSS... 1 9. SPACE TRUSS... 11 9.3 SUMMARY... 1 9.4 EXERCISES... 15 9. Trss analysis 9.1 Planar trss: The differential eqation for the eqilibrim of an elastic bar (above)

More information

Subcritical bifurcation to innitely many rotating waves. Arnd Scheel. Freie Universitat Berlin. Arnimallee Berlin, Germany

Subcritical bifurcation to innitely many rotating waves. Arnd Scheel. Freie Universitat Berlin. Arnimallee Berlin, Germany Sbcritical bifrcation to innitely many rotating waves Arnd Scheel Institt fr Mathematik I Freie Universitat Berlin Arnimallee 2-6 14195 Berlin, Germany 1 Abstract We consider the eqation 00 + 1 r 0 k2

More information

New Multi-User OFDM Scheme: Braided Code Division Multiple Access

New Multi-User OFDM Scheme: Braided Code Division Multiple Access New Mlti-User Scheme: Braided Code Division Mltiple Access Marcos B.S. Tavares, Michael Lentmaier, Kamil Sh. Zigangirov and Gerhard. Fettweis Vodafone Chair Mobile Commnications Systems, Technische Universität

More information

FOUNTAIN codes [3], [4] provide an efficient solution

FOUNTAIN codes [3], [4] provide an efficient solution Inactivation Decoding of LT and Raptor Codes: Analysis and Code Design Francisco Lázaro, Stdent Member, IEEE, Gianligi Liva, Senior Member, IEEE, Gerhard Bach, Fellow, IEEE arxiv:176.5814v1 [cs.it 19 Jn

More information

Capacity of a channel Shannon s second theorem. Information Theory 1/33

Capacity of a channel Shannon s second theorem. Information Theory 1/33 Capacity of a channel Shannon s second theorem Information Theory 1/33 Outline 1. Memoryless channels, examples ; 2. Capacity ; 3. Symmetric channels ; 4. Channel Coding ; 5. Shannon s second theorem,

More information

A Comparison of Superposition Coding Schemes

A Comparison of Superposition Coding Schemes A Comparison of Superposition Coding Schemes Lele Wang, Eren Şaşoğlu, Bernd Bandemer, and Young-Han Kim Department of Electrical and Computer Engineering University of California, San Diego La Jolla, CA

More information

Capacity bounds for multiple access-cognitive interference channel

Capacity bounds for multiple access-cognitive interference channel Mirmohseni et al. EURASIP Journal on Wireless Communications and Networking, :5 http://jwcn.eurasipjournals.com/content///5 RESEARCH Open Access Capacity bounds for multiple access-cognitive interference

More information

We automate the bivariate change-of-variables technique for bivariate continuous random variables with

We automate the bivariate change-of-variables technique for bivariate continuous random variables with INFORMS Jornal on Compting Vol. 4, No., Winter 0, pp. 9 ISSN 09-9856 (print) ISSN 56-558 (online) http://dx.doi.org/0.87/ijoc.046 0 INFORMS Atomating Biariate Transformations Jeff X. Yang, John H. Drew,

More information

EE5139R: Problem Set 7 Assigned: 30/09/15, Due: 07/10/15

EE5139R: Problem Set 7 Assigned: 30/09/15, Due: 07/10/15 EE5139R: Problem Set 7 Assigned: 30/09/15, Due: 07/10/15 1. Cascade of Binary Symmetric Channels The conditional probability distribution py x for each of the BSCs may be expressed by the transition probability

More information

Lecture 6 I. CHANNEL CODING. X n (m) P Y X

Lecture 6 I. CHANNEL CODING. X n (m) P Y X 6- Introduction to Information Theory Lecture 6 Lecturer: Haim Permuter Scribe: Yoav Eisenberg and Yakov Miron I. CHANNEL CODING We consider the following channel coding problem: m = {,2,..,2 nr} Encoder

More information

Performance analysis of GTS allocation in Beacon Enabled IEEE

Performance analysis of GTS allocation in Beacon Enabled IEEE 1 Performance analysis of GTS allocation in Beacon Enabled IEEE 8.15.4 Pangn Park, Carlo Fischione, Karl Henrik Johansson Abstract Time-critical applications for wireless sensor networks (WSNs) are an

More information

Lecture 3: Channel Capacity

Lecture 3: Channel Capacity Lecture 3: Channel Capacity 1 Definitions Channel capacity is a measure of maximum information per channel usage one can get through a channel. This one of the fundamental concepts in information theory.

More information

Upper Bounds on the Capacity of Binary Intermittent Communication

Upper Bounds on the Capacity of Binary Intermittent Communication Upper Bounds on the Capacity of Binary Intermittent Communication Mostafa Khoshnevisan and J. Nicholas Laneman Department of Electrical Engineering University of Notre Dame Notre Dame, Indiana 46556 Email:{mhoshne,

More information

L 1 -smoothing for the Ornstein-Uhlenbeck semigroup

L 1 -smoothing for the Ornstein-Uhlenbeck semigroup L -smoothing for the Ornstein-Uhlenbeck semigrop K. Ball, F. Barthe, W. Bednorz, K. Oleszkiewicz and P. Wolff September, 00 Abstract Given a probability density, we estimate the rate of decay of the measre

More information

Robust Tracking and Regulation Control of Uncertain Piecewise Linear Hybrid Systems

Robust Tracking and Regulation Control of Uncertain Piecewise Linear Hybrid Systems ISIS Tech. Rept. - 2003-005 Robst Tracking and Reglation Control of Uncertain Piecewise Linear Hybrid Systems Hai Lin Panos J. Antsaklis Department of Electrical Engineering, University of Notre Dame,

More information

Development of Second Order Plus Time Delay (SOPTD) Model from Orthonormal Basis Filter (OBF) Model

Development of Second Order Plus Time Delay (SOPTD) Model from Orthonormal Basis Filter (OBF) Model Development of Second Order Pls Time Delay (SOPTD) Model from Orthonormal Basis Filter (OBF) Model Lemma D. Tfa*, M. Ramasamy*, Sachin C. Patwardhan **, M. Shhaimi* *Chemical Engineering Department, Universiti

More information

A Theory of Markovian Time Inconsistent Stochastic Control in Discrete Time

A Theory of Markovian Time Inconsistent Stochastic Control in Discrete Time A Theory of Markovian Time Inconsistent Stochastic Control in Discrete Time Tomas Björk Department of Finance, Stockholm School of Economics tomas.bjork@hhs.se Agatha Mrgoci Department of Economics Aarhs

More information

Phase Transitions for Mutual Information

Phase Transitions for Mutual Information Phase Transitions for Mtal Information K. Raj Kmar*, Payam Pakzad t, Amir Hesam Salavati* and Amin Shokrollahi* *Laboratoire d' algorithmiqe Ecole Poly techniqe Federale de Lasanne, 05 Lasanne, Switzerland

More information

Theoretical and Experimental Implementation of DC Motor Nonlinear Controllers

Theoretical and Experimental Implementation of DC Motor Nonlinear Controllers Theoretical and Experimental Implementation of DC Motor Nonlinear Controllers D.R. Espinoza-Trejo and D.U. Campos-Delgado Facltad de Ingeniería, CIEP, UASLP, espinoza trejo dr@aslp.mx Facltad de Ciencias,

More information

Information Theory. Lecture 10. Network Information Theory (CT15); a focus on channel capacity results

Information Theory. Lecture 10. Network Information Theory (CT15); a focus on channel capacity results Information Theory Lecture 10 Network Information Theory (CT15); a focus on channel capacity results The (two-user) multiple access channel (15.3) The (two-user) broadcast channel (15.6) The relay channel

More information

Nonparametric Identification and Robust H Controller Synthesis for a Rotational/Translational Actuator

Nonparametric Identification and Robust H Controller Synthesis for a Rotational/Translational Actuator Proceedings of the 6 IEEE International Conference on Control Applications Mnich, Germany, October 4-6, 6 WeB16 Nonparametric Identification and Robst H Controller Synthesis for a Rotational/Translational

More information

An Achievable Rate Region for the 3-User-Pair Deterministic Interference Channel

An Achievable Rate Region for the 3-User-Pair Deterministic Interference Channel Forty-Ninth Annual Allerton Conference Allerton House, UIUC, Illinois, USA September 8-3, An Achievable Rate Region for the 3-User-Pair Deterministic Interference Channel Invited Paper Bernd Bandemer and

More information

Move Blocking Strategies in Receding Horizon Control

Move Blocking Strategies in Receding Horizon Control Move Blocking Strategies in Receding Horizon Control Raphael Cagienard, Pascal Grieder, Eric C. Kerrigan and Manfred Morari Abstract In order to deal with the comptational brden of optimal control, it

More information

Study on the impulsive pressure of tank oscillating by force towards multiple degrees of freedom

Study on the impulsive pressure of tank oscillating by force towards multiple degrees of freedom EPJ Web of Conferences 80, 0034 (08) EFM 07 Stdy on the implsive pressre of tank oscillating by force towards mltiple degrees of freedom Shigeyki Hibi,* The ational Defense Academy, Department of Mechanical

More information

Step-Size Bounds Analysis of the Generalized Multidelay Adaptive Filter

Step-Size Bounds Analysis of the Generalized Multidelay Adaptive Filter WCE 007 Jly - 4 007 London UK Step-Size onds Analysis of the Generalized Mltidelay Adaptive Filter Jnghsi Lee and Hs Chang Hang Abstract In this paper we analyze the bonds of the fixed common step-size

More information

Affine Invariant Total Variation Models

Affine Invariant Total Variation Models Affine Invariant Total Variation Models Helen Balinsky, Alexander Balinsky Media Technologies aboratory HP aboratories Bristol HP-7-94 Jne 6, 7* Total Variation, affine restoration, Sobolev ineqality,

More information

Large Panel Test of Factor Pricing Models

Large Panel Test of Factor Pricing Models Large Panel est of Factor Pricing Models Jianqing Fan, Yan Liao and Jiawei Yao Department of Operations Research and Financial Engineering, Princeton University Bendheim Center for Finance, Princeton University

More information

Linear and Nonlinear Model Predictive Control of Quadruple Tank Process

Linear and Nonlinear Model Predictive Control of Quadruple Tank Process Linear and Nonlinear Model Predictive Control of Qadrple Tank Process P.Srinivasarao Research scholar Dr.M.G.R.University Chennai, India P.Sbbaiah, PhD. Prof of Dhanalaxmi college of Engineering Thambaram

More information

CHARACTERIZATIONS OF EXPONENTIAL DISTRIBUTION VIA CONDITIONAL EXPECTATIONS OF RECORD VALUES. George P. Yanev

CHARACTERIZATIONS OF EXPONENTIAL DISTRIBUTION VIA CONDITIONAL EXPECTATIONS OF RECORD VALUES. George P. Yanev Pliska Std. Math. Blgar. 2 (211), 233 242 STUDIA MATHEMATICA BULGARICA CHARACTERIZATIONS OF EXPONENTIAL DISTRIBUTION VIA CONDITIONAL EXPECTATIONS OF RECORD VALUES George P. Yanev We prove that the exponential

More information

BLIND IMAGE WATERMARKING BASED ON SAMPLE ROTATION WITH OPTIMAL DETECTOR

BLIND IMAGE WATERMARKING BASED ON SAMPLE ROTATION WITH OPTIMAL DETECTOR 7th Eropean Signal Processing Conference (EUSIPCO 009 Glasgow, Scotland, Agst -8, 009 BLIND IMAGE WATERMARKING BASED ON SAMPLE ROTATION WITH OPTIMAL DETECTOR S.M.E. Sahraeian, M.A. Akhaee, and F. Marvasti

More information

Gradient Projection Anti-windup Scheme on Constrained Planar LTI Systems. Justin Teo and Jonathan P. How

Gradient Projection Anti-windup Scheme on Constrained Planar LTI Systems. Justin Teo and Jonathan P. How 1 Gradient Projection Anti-windp Scheme on Constrained Planar LTI Systems Jstin Teo and Jonathan P. How Technical Report ACL1 1 Aerospace Controls Laboratory Department of Aeronatics and Astronatics Massachsetts

More information

Chapter 4. Data Transmission and Channel Capacity. Po-Ning Chen, Professor. Department of Communications Engineering. National Chiao Tung University

Chapter 4. Data Transmission and Channel Capacity. Po-Ning Chen, Professor. Department of Communications Engineering. National Chiao Tung University Chapter 4 Data Transmission and Channel Capacity Po-Ning Chen, Professor Department of Communications Engineering National Chiao Tung University Hsin Chu, Taiwan 30050, R.O.C. Principle of Data Transmission

More information

The Linear Quadratic Regulator

The Linear Quadratic Regulator 10 The Linear Qadratic Reglator 10.1 Problem formlation This chapter concerns optimal control of dynamical systems. Most of this development concerns linear models with a particlarly simple notion of optimality.

More information

Discussion of The Forward Search: Theory and Data Analysis by Anthony C. Atkinson, Marco Riani, and Andrea Ceroli

Discussion of The Forward Search: Theory and Data Analysis by Anthony C. Atkinson, Marco Riani, and Andrea Ceroli 1 Introdction Discssion of The Forward Search: Theory and Data Analysis by Anthony C. Atkinson, Marco Riani, and Andrea Ceroli Søren Johansen Department of Economics, University of Copenhagen and CREATES,

More information

Equivalence for Networks with Adversarial State

Equivalence for Networks with Adversarial State Equivalence for Networks with Adversarial State Oliver Kosut Department of Electrical, Computer and Energy Engineering Arizona State University Tempe, AZ 85287 Email: okosut@asu.edu Jörg Kliewer Department

More information

(Classical) Information Theory III: Noisy channel coding

(Classical) Information Theory III: Noisy channel coding (Classical) Information Theory III: Noisy channel coding Sibasish Ghosh The Institute of Mathematical Sciences CIT Campus, Taramani, Chennai 600 113, India. p. 1 Abstract What is the best possible way

More information

Convergence analysis of ant colony learning

Convergence analysis of ant colony learning Delft University of Technology Delft Center for Systems and Control Technical report 11-012 Convergence analysis of ant colony learning J van Ast R Babška and B De Schtter If yo want to cite this report

More information

Formules relatives aux probabilités qui dépendent de très grands nombers

Formules relatives aux probabilités qui dépendent de très grands nombers Formles relatives ax probabilités qi dépendent de très grands nombers M. Poisson Comptes rends II (836) pp. 603-63 In the most important applications of the theory of probabilities, the chances of events

More information

IET Commun., 2009, Vol. 3, Iss. 4, pp doi: /iet-com & The Institution of Engineering and Technology 2009

IET Commun., 2009, Vol. 3, Iss. 4, pp doi: /iet-com & The Institution of Engineering and Technology 2009 Published in IET Communications Received on 10th March 2008 Revised on 10th July 2008 ISSN 1751-8628 Comprehensive partial decoding approach for two-level relay networks L. Ghabeli M.R. Aref Information

More information

ELEC546 Review of Information Theory

ELEC546 Review of Information Theory ELEC546 Review of Information Theory Vincent Lau 1/1/004 1 Review of Information Theory Entropy: Measure of uncertainty of a random variable X. The entropy of X, H(X), is given by: If X is a discrete random

More information

On Multiple User Channels with State Information at the Transmitters

On Multiple User Channels with State Information at the Transmitters On Multiple User Channels with State Information at the Transmitters Styrmir Sigurjónsson and Young-Han Kim* Information Systems Laboratory Stanford University Stanford, CA 94305, USA Email: {styrmir,yhk}@stanford.edu

More information

The Coset Distribution of Triple-Error-Correcting Binary Primitive BCH Codes

The Coset Distribution of Triple-Error-Correcting Binary Primitive BCH Codes IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 5, NO., APRIL 00 177 The Coset Distribtion of iple-error-correcting Binary Primitive BCH Codes Pascale Charpin, Member, IEEE, TorHelleseth, Fellow, IEEE, VictorA.

More information

Energy State Amplification in an Energy Harvesting Communication System

Energy State Amplification in an Energy Harvesting Communication System Energy State Amplification in an Energy Harvesting Communication System Omur Ozel Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland College Park, MD 20742 omur@umd.edu

More information

Lecture 4 Noisy Channel Coding

Lecture 4 Noisy Channel Coding Lecture 4 Noisy Channel Coding I-Hsiang Wang Department of Electrical Engineering National Taiwan University ihwang@ntu.edu.tw October 9, 2015 1 / 56 I-Hsiang Wang IT Lecture 4 The Channel Coding Problem

More information

Technical Note. ODiSI-B Sensor Strain Gage Factor Uncertainty

Technical Note. ODiSI-B Sensor Strain Gage Factor Uncertainty Technical Note EN-FY160 Revision November 30, 016 ODiSI-B Sensor Strain Gage Factor Uncertainty Abstract Lna has pdated or strain sensor calibration tool to spport NIST-traceable measrements, to compte

More information

Performance analysis of the MAP equalizer within an iterative receiver including a channel estimator

Performance analysis of the MAP equalizer within an iterative receiver including a channel estimator Performance analysis of the MAP eqalizer within an iterative receiver inclding a channel estimator Nora Sellami ISECS Rote Menzel Chaer m 0.5 B.P 868, 308 Sfax, Tnisia Aline Romy IRISA-INRIA Camps de Bealie

More information

Distributed Lossless Compression. Distributed lossless compression system

Distributed Lossless Compression. Distributed lossless compression system Lecture #3 Distributed Lossless Compression (Reading: NIT 10.1 10.5, 4.4) Distributed lossless source coding Lossless source coding via random binning Time Sharing Achievability proof of the Slepian Wolf

More information

REINFORCEMENT LEARNING AND OPTIMAL ADAPTIVE CONTROL

REINFORCEMENT LEARNING AND OPTIMAL ADAPTIVE CONTROL Lewis c11.tex V1-10/19/2011 4:10pm Page 461 11 REINFORCEMENT LEARNING AND OPTIMAL ADAPTIVE CONTROL In this book we have presented a variety of methods for the analysis and design of optimal control systems.

More information

Multiaccess Channels with State Known to One Encoder: A Case of Degraded Message Sets

Multiaccess Channels with State Known to One Encoder: A Case of Degraded Message Sets Multiaccess Channels with State Known to One Encoder: A Case of Degraded Message Sets Shivaprasad Kotagiri and J. Nicholas Laneman Department of Electrical Engineering University of Notre Dame Notre Dame,

More information

FEA Solution Procedure

FEA Solution Procedure EA Soltion Procedre (demonstrated with a -D bar element problem) EA Procedre for Static Analysis. Prepare the E model a. discretize (mesh) the strctre b. prescribe loads c. prescribe spports. Perform calclations

More information

On the Capacity of the Two-Hop Half-Duplex Relay Channel

On the Capacity of the Two-Hop Half-Duplex Relay Channel On the Capacity of the Two-Hop Half-Duplex Relay Channel Nikola Zlatanov, Vahid Jamali, and Robert Schober University of British Columbia, Vancouver, Canada, and Friedrich-Alexander-University Erlangen-Nürnberg,

More information

Full Duplex in Massive MIMO Systems: Analysis and Feasibility

Full Duplex in Massive MIMO Systems: Analysis and Feasibility Fll Dplex in Massive MIMO Systems: Analysis and Feasibility Radwa Sltan Lingyang Song Karim G. Seddik andzhan Electrical and Compter Engineering Department University of oston TX USA School of Electrical

More information

Keyless authentication in the presence of a simultaneously transmitting adversary

Keyless authentication in the presence of a simultaneously transmitting adversary Keyless authentication in the presence of a simultaneously transmitting adversary Eric Graves Army Research Lab Adelphi MD 20783 U.S.A. ericsgra@ufl.edu Paul Yu Army Research Lab Adelphi MD 20783 U.S.A.

More information

Cut-Set Bound and Dependence Balance Bound

Cut-Set Bound and Dependence Balance Bound Cut-Set Bound and Dependence Balance Bound Lei Xiao lxiao@nd.edu 1 Date: 4 October, 2006 Reading: Elements of information theory by Cover and Thomas [1, Section 14.10], and the paper by Hekstra and Willems

More information

Bayes and Naïve Bayes Classifiers CS434

Bayes and Naïve Bayes Classifiers CS434 Bayes and Naïve Bayes Classifiers CS434 In this lectre 1. Review some basic probability concepts 2. Introdce a sefl probabilistic rle - Bayes rle 3. Introdce the learning algorithm based on Bayes rle (ths

More information

A Model-Free Adaptive Control of Pulsed GTAW

A Model-Free Adaptive Control of Pulsed GTAW A Model-Free Adaptive Control of Plsed GTAW F.L. Lv 1, S.B. Chen 1, and S.W. Dai 1 Institte of Welding Technology, Shanghai Jiao Tong University, Shanghai 00030, P.R. China Department of Atomatic Control,

More information

Discussion Papers Department of Economics University of Copenhagen

Discussion Papers Department of Economics University of Copenhagen Discssion Papers Department of Economics University of Copenhagen No. 10-06 Discssion of The Forward Search: Theory and Data Analysis, by Anthony C. Atkinson, Marco Riani, and Andrea Ceroli Søren Johansen,

More information

Conditions for Approaching the Origin without Intersecting the x-axis in the Liénard Plane

Conditions for Approaching the Origin without Intersecting the x-axis in the Liénard Plane Filomat 3:2 (27), 376 377 https://doi.org/.2298/fil7276a Pblished by Faclty of Sciences and Mathematics, University of Niš, Serbia Available at: http://www.pmf.ni.ac.rs/filomat Conditions for Approaching

More information

Cubic graphs have bounded slope parameter

Cubic graphs have bounded slope parameter Cbic graphs have bonded slope parameter B. Keszegh, J. Pach, D. Pálvölgyi, and G. Tóth Agst 25, 2009 Abstract We show that every finite connected graph G with maximm degree three and with at least one

More information

On relative errors of floating-point operations: optimal bounds and applications

On relative errors of floating-point operations: optimal bounds and applications On relative errors of floating-point operations: optimal bonds and applications Clade-Pierre Jeannerod, Siegfried M. Rmp To cite this version: Clade-Pierre Jeannerod, Siegfried M. Rmp. On relative errors

More information

The Replenishment Policy for an Inventory System with a Fixed Ordering Cost and a Proportional Penalty Cost under Poisson Arrival Demands

The Replenishment Policy for an Inventory System with a Fixed Ordering Cost and a Proportional Penalty Cost under Poisson Arrival Demands Scientiae Mathematicae Japonicae Online, e-211, 161 167 161 The Replenishment Policy for an Inventory System with a Fixed Ordering Cost and a Proportional Penalty Cost nder Poisson Arrival Demands Hitoshi

More information

Section 7.4: Integration of Rational Functions by Partial Fractions

Section 7.4: Integration of Rational Functions by Partial Fractions Section 7.4: Integration of Rational Fnctions by Partial Fractions This is abot as complicated as it gets. The Method of Partial Fractions Ecept for a few very special cases, crrently we have no way to

More information

Interference Channels with Source Cooperation

Interference Channels with Source Cooperation Interference Channels with Source Cooperation arxiv:95.319v1 [cs.it] 19 May 29 Vinod Prabhakaran and Pramod Viswanath Coordinated Science Laboratory University of Illinois, Urbana-Champaign Urbana, IL

More information

Quantum Key Distribution Using Decoy State Protocol

Quantum Key Distribution Using Decoy State Protocol American J. of Engineering and Applied Sciences 2 (4): 694-698, 2009 ISSN 94-7020 2009 Science Pblications Qantm Key Distribtion sing Decoy State Protocol,2 Sellami Ali, 2 Shhairi Sahardin and,2 M.R.B.

More information

X 1 : X Table 1: Y = X X 2

X 1 : X Table 1: Y = X X 2 ECE 534: Elements of Information Theory, Fall 200 Homework 3 Solutions (ALL DUE to Kenneth S. Palacio Baus) December, 200. Problem 5.20. Multiple access (a) Find the capacity region for the multiple-access

More information

Chapter 3 MATHEMATICAL MODELING OF DYNAMIC SYSTEMS

Chapter 3 MATHEMATICAL MODELING OF DYNAMIC SYSTEMS Chapter 3 MATHEMATICAL MODELING OF DYNAMIC SYSTEMS 3. System Modeling Mathematical Modeling In designing control systems we mst be able to model engineered system dynamics. The model of a dynamic system

More information

An extremum seeking approach to parameterised loop-shaping control design

An extremum seeking approach to parameterised loop-shaping control design Preprints of the 19th World Congress The International Federation of Atomatic Control An extremm seeking approach to parameterised loop-shaping control design Chih Feng Lee Sei Zhen Khong Erik Frisk Mattias

More information

Frequency Estimation, Multiple Stationary Nonsinusoidal Resonances With Trend 1

Frequency Estimation, Multiple Stationary Nonsinusoidal Resonances With Trend 1 Freqency Estimation, Mltiple Stationary Nonsinsoidal Resonances With Trend 1 G. Larry Bretthorst Department of Chemistry, Washington University, St. Lois MO 6313 Abstract. In this paper, we address the

More information

Simplified Identification Scheme for Structures on a Flexible Base

Simplified Identification Scheme for Structures on a Flexible Base Simplified Identification Scheme for Strctres on a Flexible Base L.M. Star California State University, Long Beach G. Mylonais University of Patras, Greece J.P. Stewart University of California, Los Angeles

More information

Model Discrimination of Polynomial Systems via Stochastic Inputs

Model Discrimination of Polynomial Systems via Stochastic Inputs Model Discrimination of Polynomial Systems via Stochastic Inpts D. Georgiev and E. Klavins Abstract Systems biologists are often faced with competing models for a given experimental system. Unfortnately,

More information

Simultaneous Nonunique Decoding Is Rate-Optimal

Simultaneous Nonunique Decoding Is Rate-Optimal Fiftieth Annual Allerton Conference Allerton House, UIUC, Illinois, USA October 1-5, 2012 Simultaneous Nonunique Decoding Is Rate-Optimal Bernd Bandemer University of California, San Diego La Jolla, CA

More information

Chapter 4 Supervised learning:

Chapter 4 Supervised learning: Chapter 4 Spervised learning: Mltilayer Networks II Madaline Other Feedforward Networks Mltiple adalines of a sort as hidden nodes Weight change follows minimm distrbance principle Adaptive mlti-layer

More information

A Characterization of Interventional Distributions in Semi-Markovian Causal Models

A Characterization of Interventional Distributions in Semi-Markovian Causal Models A Characterization of Interventional Distribtions in Semi-Markovian Casal Models Jin Tian and Changsng Kang Department of Compter Science Iowa State University Ames, IA 50011 {jtian, cskang}@cs.iastate.ed

More information

The Poisson Channel with Side Information

The Poisson Channel with Side Information The Poisson Channel with Side Information Shraga Bross School of Enginerring Bar-Ilan University, Israel brosss@macs.biu.ac.il Amos Lapidoth Ligong Wang Signal and Information Processing Laboratory ETH

More information

Assignment Fall 2014

Assignment Fall 2014 Assignment 5.086 Fall 04 De: Wednesday, 0 December at 5 PM. Upload yor soltion to corse website as a zip file YOURNAME_ASSIGNMENT_5 which incldes the script for each qestion as well as all Matlab fnctions

More information

PREDICTABILITY OF SOLID STATE ZENER REFERENCES

PREDICTABILITY OF SOLID STATE ZENER REFERENCES PREDICTABILITY OF SOLID STATE ZENER REFERENCES David Deaver Flke Corporation PO Box 99 Everett, WA 986 45-446-6434 David.Deaver@Flke.com Abstract - With the advent of ISO/IEC 175 and the growth in laboratory

More information

4.2 First-Order Logic

4.2 First-Order Logic 64 First-Order Logic and Type Theory The problem can be seen in the two qestionable rles In the existential introdction, the term a has not yet been introdced into the derivation and its se can therefore

More information